Data Privacy Management and Autonomous Spontaneous Security

5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers

  • Joaquin Garcia-Alfaro
  • Guillermo Navarro-Arribas
  • Ana Cavalli
  • Jean Leneutre
Conference proceedings

DOI: 10.1007/978-3-642-19348-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6514)

Table of contents

  1. Front Matter
  2. Keynote Talks

    1. Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga
      Pages 8-21
  3. Data Privacy Management

    1. Shinsaku Kiyomoto, Toshiaki Tanaka
      Pages 22-35
    2. Hessam Zakerzadeh, Sylvia L. Osborn
      Pages 36-50
    3. Ali Özhan Gürel, Atakan Arslan, Mete Akgün
      Pages 64-78
    4. Arnau Vives-Guasch, Magdalena Payeras-Capella, Macià Mut-Puigserver, Jordi Castellà-Roca
      Pages 79-92
    5. Almudena Alcaide, Ali E. Abdallah, Ana I. González–Tablas, José M. de Fuentes
      Pages 108-122
    6. Vasilios Katos, Frank Stowell, Peter Bednar
      Pages 123-139
    7. Kunihiko Fujita, Yasuyuki Tsukada
      Pages 140-154
  4. Autonomous and Spontaneous Security

    1. Nouha Oualha, Yves Roudier
      Pages 155-169
    2. Wendy Maiden, Ioanna Dionysiou, Deborah Frincke, Glenn Fink, David E. Bakken
      Pages 188-202
    3. Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Stere Preda
      Pages 203-215
    4. Ruan He, Marc Lacoste, Jacques Pulou, Jean Leneutre
      Pages 216-230
    5. Albert Fernàndez-Mir, Jordi Castellà-Roca, Alexandre Viejo
      Pages 231-243
    6. Hedi Benzina, Jean Goubault-Larrecq
      Pages 244-258
  5. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.

Keywords

anonymization anonymizing algorithms cryptographic privacy protocols data publishing privacy digital payment systems network monitoring privacy network security policies privacy enforcement privacy-enhancing technologies reputation systems anonymity secret sharing secure RFID authentication security management strategies surveillance trust models virtualized security

Editors and affiliations

  • Joaquin Garcia-Alfaro
    • 1
  • Guillermo Navarro-Arribas
    • 2
  • Ana Cavalli
    • 3
  • Jean Leneutre
    • 4
  1. 1.IT/TELECOM Bretagne, Campus de RennesCesson Sévigné, CedexFrance
  2. 2.IIIA-CSIC, Campus UABBellaterraSpain
  3. 3.IT/TELECOM SudParisEvry CedexFrance
  4. 4.IT/TELECOM ParisTechParis Cedex 13France

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-19347-7
  • Online ISBN 978-3-642-19348-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349